- Architecting the Industrial Internet
- Shyam Nath Robert Stackowiak Carla Romano
- 119字
- 2021-07-02 23:59:26
Security considerations for the functional viewpoint
Following are some of the security consideration for the functional viewpoint:
- Security audit: To collect, store, and analyze security-related information.
- Identity verification: In communications, it protects the integrity of communications within the IIoT system.
- Cryptographic support: This involves software and hardware for encryption and decryption.
- Data protection and privacy: This protects sensitive and personal information, both at rest and while in transit. Data protection requirements are defined by a security policy, and should be in keeping with organizational and regulatory requirements.
- Authentication and identity management: This ensures users only have access to the functions and data for which they are authorized.
- Physical protection: This enforces security policies to prevent tampering and unauthorized observation.
推薦閱讀
- 數據庫系統原理及MySQL應用教程(第2版)
- 深度實踐OpenStack:基于Python的OpenStack組件開發
- Effective C#:改善C#代碼的50個有效方法(原書第3版)
- Mastering Kotlin
- Scratch真好玩:教小孩學編程
- Python數據分析(第2版)
- Microsoft System Center Orchestrator 2012 R2 Essentials
- 精通Linux(第2版)
- 零基礎學Python網絡爬蟲案例實戰全流程詳解(入門與提高篇)
- 全棧自動化測試實戰:基于TestNG、HttpClient、Selenium和Appium
- 領域驅動設計:軟件核心復雜性應對之道(修訂版)
- Python滲透測試編程技術:方法與實踐(第2版)
- C# 7 and .NET Core 2.0 Blueprints
- Analytics for the Internet of Things(IoT)
- Game Programming using Qt 5 Beginner's Guide